welcome & introduction to black hat usa 2011
Keynote
War Texting: Identifying and Interacting with Devices on the Telephone Network
Macs in the Age of the APT
Analyzing SPDY: Getting to know the new web protocol
Hacking .Net Applications: The Black Arts
Reviving smart card analysis
Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS
Constant Insecurity: Things you didn't know about (PE) Portable Executable file format
Easy and quick vulnerability hunting in Windows
Advanced Wi-Fi Security Penetration Testing
Heap spray detection with Heap Inspector
Owning the Routing Table - New OSPF Attacks
Weapons of Targeted Attack: Modern Document Exploit Techniques
Hacking Google Chrome OS
Attacking Clientside JIT Compilers
Vulnerabilities of Wireless Water Meter Networks
IEEE Software Taggant System
Physical Memory Forensics for Cache
The Troika of E-Discovery: Ethics, ESI, and Expertise in a Web 2.0 World
Overcoming IOS Data Protection to Re-enable iPhone Forensics
Black Ops of TCP/IP 2011
The Rustock Botnet Takedown
Server-Side JavaScript Injection: Attacking NoSQL and Node.js
Windows Hooks of Death: Kernel Attacks Through User-Mode Callbacks
Exploiting Siemens Simatic S7 PLCs
From Redmond with Love!
Beyond files undeleting: OWADE
The Art of Exploiting Lesser Known Injection Flaws
Binary Instrumentation workshop for security experts
SSH as the next back door. Are you giving hackers root access?
Femtocells: A poisonous needle in the operator's hay stack
Tamper Evident Seals - Design and Security
Reverse Engineering Browser Components - Dissecting and Hacking Silverlight, HTML 5 and Flex
Apple iOS Security Evaluation: Vulnerability Analysis and Data Encryption
Spy-Sense: Spyware Tool for executing Stealthy Exploits against Sensor Networks
The Ultimate Study of Real-Life SSL Issues
Covert Post-Exploitation Forensics With Metasploit
Function Rerouting from Kernel Land "Hades"
OAuth - Securing the Insecure
Bit-squatting: DNS Hijacking without exploitation
Aerial Cyber Apocalypse: If we can do it... they can too.
Pulp Google Hacking - The Next Generation Search Engine Hacking Arsenal
Playing In The Reader X Sandbox
ARM exploitation ROPmap
Familiarity Breeds Contempt: The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulns
Post Memory Corruption Memory Analysis
Affiliate Programs: Legitimate Business or Fuelling Cybercrime?
PPI-Geolocation: The next generation of 802.11 visualization and geo-location
Reception and Hacker Court
Pwnie Awards